單項選擇題Which of the following options lists the steps in PPP session establishment in the correct order?()

A. Optional authentication phase, link establishment phase, network layer protocol phase.
B. Network layer protocol phase, link establishment phase, optional authentication phase.
C. Network layer protocol phase, optional authentication phase, link establishment phase.
D. Link establishment phase, network layer protocol phase, optional authentication phase.
E. Link establishment phase, optional authentication phase, network layer protocol phase.
F. Optional authentication phase, network layer protocol phase, link establishment phase.


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題Which characteristics are representative of a link-state routing protocol?()

A. Provide common view of entire topology
B. Exchange routing tables with neighbors.
C. Calculates shortest path.
D. Utilizes event triggered updates.
E. Utilizes frequent periodic updates.

3.多項選擇題Which of the following contribute to congestion on an Ethernet network?()

A. Use of full duplex mode.
B. Creation of new collision domain.
C. Creation of new broadcast domain.
D. Addition of hub to the network.
E. Use of switches in the network.
F. Amount of ARP or IPX SAP traffic.

4.多項選擇題Which of the following correctly describe steps in the OSI data encapsulation process?()

A. Transport layer divides a data stream into segments & adds reliability & flow control information
B. Data link layer adds physical source & destination address & an FCS to the segment
C. Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
D. Packets are created when the network layers adds layers 3 address & control information to a segment
E. The presentation layer translated bits into bits into voltages for transmission across the physical link

5.單項選擇題What does a configuration Register Setting of 0x2105 indicate to the Router? ()

A. The Boot IOS Code is Located in the NVRAM.
B. Check NVRAM for boot system Commands.
C. Bypass NVRAM Configurations.
D. Boot the IOS Code Located in ROM.
E. Perform a Password Recovery.
F. Bypass The Code In ROM.

最新試題

Which connections allow the use of full-duplex Ethernet?()

題型:多項選擇題

The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses.What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? ()

題型:單項選擇題

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

題型:多項選擇題

Which of the following contribute to congestion on an Ethernet network?()

題型:多項選擇題

Which of the following statements regarding routed and routing protocols are true?()

題型:多項選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項選擇題

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()

題型:單項選擇題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項選擇題